hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Project Forgery: Automating CSRF Exploit Generation
Medium
Project Forgery: Automating CSRF Exploit Generation
A tool for generating Cross-Site Request Forgery (CSRF) exploit HTML for security testing.
hack and bug bounty
I will do penetration test for web app and give you detailed report
Medium
I will do penetration test for web app and give you detailed report
Welcome to my gig.
hack and bug bounty
Tactics — Hack the Box Write-Up
Medium
Tactics — Hack the Box Write-Up
Hello everyone! I would like to introduce you to a beginner-level Hack-the-Box room called “Tactics.” This room covers the fundamentals of…
hack and bug bounty
Bug Bounty Hunter — Captcha Bypass #Response-to-this-Request
Medium
Bug Bounty Hunter — Captcha Bypass #Response-to-this-Request
Hello folks, I’m back again after a long hiatus. I visited bug bounty masters in the deep valleys of India, I learned many subtleties of…
hack and bug bounty
Unleashing the Power: The Ultimate Reverse Shell Generator
Medium
Unleashing the Power: The Ultimate Reverse Shell Generator
In this groundbreaking video, we unveil the unrivaled power of our Ultimate Reverse Shell Generator tool. Designed to empower both ethical…
hack and bug bounty
How to start Bug Bounty and What is Learning path
Medium
How to start Bug Bounty and What is Learning path
Hello Everyone, Today I will tell you how to start Bug Hunting journey with proper learning path. First understand What is Bug Bounty?
hack and bug bounty
“Open Redirects in Mobile Applications” A Growing Threat
Medium
“Open Redirects in Mobile Applications” A Growing Threat
In an era where mobile applications have become an integral part of our daily lives, ensuring the security of these apps is of paramount…
hack and bug bounty
5+All Security Resource Digest for 2023–10–4
Medium
5+All Security Resource Digest for 2023–10–4
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
> 1
Medium
🛑
𝙋𝘼𝙍𝙏 > 1
📛
ব্ল্যাক ওয়েব মূলত ২টি অংশ : -
hack and bug bounty
Chaining Open Redirects to Achieve Remote Code Execution
Medium
Chaining Open Redirects to Achieve Remote Code Execution
In the world of web application security, open redirects are often considered low-priority vulnerabilities. However, when combined with…
hack and bug bounty
Open Redirects in Modern Single Sign-On (SSO) Implementations
Medium
Open Redirects in Modern Single Sign-On (SSO) Implementations
In an increasingly interconnected digital landscape, Single Sign-On (SSO) solutions have emerged as a vital tool for simplifying…
hack and bug bounty
Linux Privilege Escalation — Sudo Shell Escape Sequences
Medium
Linux Privilege Escalation — Sudo Shell Escape Sequences
When it comes to managing user privileges on a Unix-based system, sudo is a powerful tool. It allows administrators to delegate specific…
hack and bug bounty
Demystifying Ethical Hacking: Uncovering the Guardians of the Digital Realm
Medium
Demystifying Ethical Hacking: Uncovering the Guardians of the Digital Realm
In an age where data is the new currency and cybersecurity breaches loom like dark clouds over the digital landscape, the role of ethical hacking has emerged as a critical and fascinating profession…
hack and bug bounty
What is Ethical Hacking? Types of Hacking and Career Potential
Medium
What is Ethical Hacking? Types of Hacking and Career Potential
In the previous two decades, technology has advanced quickly, giving rise to innovations and tools leading to transformations. While…
hack and bug bounty
What are the Most In-Demand Cybersecurity Skills
Medium
What are the Most In-Demand Cybersecurity Skills
The most in-demand cybersecurity skills in 2023 are:
hack and bug bounty
NoSQL in Web App Penetration Testing by Portswigger | 2023
Medium
NoSQL in Web App Penetration Testing by Portswigger | 2023
In this section, we’ll explain what NoSQL is, describe some common examples, explain how to find and exploit various kinds of NoSQL, and…
hack and bug bounty
Network Basics for Ethical Hackers
Medium
Network Basics for Ethical Hackers
Introduction
hack and bug bounty
Navigating the Digital Battlefield: Stages of a Penetration Test
Medium
Navigating the Digital Battlefield: Stages of a Penetration Test
Introduction:
hack and bug bounty
Hack The Box Lab: Unveiling Bike
Medium
Hack The Box Lab: Unveiling Bike
Starting Point — Tier 1— Bike Lab
hack and bug bounty
Mastering Basic Linux Commands for Ethical Hackers: A Comprehensive Guide
Medium
Mastering Basic Linux Commands for Ethical Hackers: A Comprehensive Guide
Introduction